Latest Cybersecurity Threats

Real-time threat intelligence from trusted sources

Nike is currently looking into a potential data breach after the World Leaks ransomware group leaked 1.4 terabytes of files that they claim to have stolen from the company. This incident raises concerns about the security of sensitive information held by one of the largest sportswear brands in the world. The leaked files could potentially contain customer data, company secrets, or other critical information, which might lead to further extortion attempts or data misuse. Nike's investigation is crucial not only for the company's reputation but also for the safety of its customers and business partners. As the situation unfolds, it highlights the ongoing threat posed by ransomware gangs targeting major corporations.

Impact: Nike's customer data, internal documents, proprietary designs, and other sensitive information.
Remediation: Nike is investigating the breach and has not specified any immediate remediation steps.
Read Original

A critical vulnerability has been identified in Grist-Core, a platform used for data management and collaboration. This security flaw allows attackers to escape the sandbox environment, leading to remote code execution through a malicious formula. Essentially, this means that someone could potentially run arbitrary code on the systems where Grist-Core is deployed, which poses a significant risk to users. Organizations using this software need to act quickly to protect their data and systems from exploitation. The details about the specific versions affected have not been disclosed, but the urgency of the situation suggests that immediate attention is required to prevent potential breaches.

Impact: Grist-Core
Remediation: Users should apply any available security patches and review configurations to limit execution of untrusted formulas.
Read Original

The extortion group known as WorldLeaks claims to have stolen 1.4TB of sensitive data from Nike, which includes around 188,347 files. Nike is currently investigating this alleged breach to assess the extent of the data compromise. This incident raises serious concerns about the security of corporate networks, particularly for large companies like Nike that handle a significant amount of sensitive information. If the claims are verified, it could lead to potential reputational damage and legal repercussions for the brand. Additionally, it highlights the ongoing threat posed by cybercriminals who are increasingly targeting major corporations to steal and exploit sensitive data.

Impact: Nike corporate data
Remediation: N/A
Read Original

Researchers have discovered a critical vulnerability in the vm2 library, a popular Node.js sandbox used to execute untrusted code. This security flaw, identified as CVE-2026-22709, enables attackers to escape the sandbox environment and execute arbitrary code on the host system. This poses a significant risk to applications that rely on this library for secure code execution. Developers using vm2 should take immediate action to protect their systems, as the implications could lead to unauthorized access and control over sensitive data. It's crucial for users to stay informed about this vulnerability and implement necessary safeguards to prevent exploitation.

Impact: vm2 Node.js library
Remediation: Developers should update to the latest version of the vm2 library as soon as a patch is released. It's also advisable to review and restrict permissions and access controls for applications using vm2 to minimize potential risk.
Read Original
Actively Exploited

The PeckBirdy command-and-control framework has been identified as a tool used by cyber attackers targeting gambling and government sectors across Asia since 2023. Researchers have linked this framework to advanced persistent threats (APTs) that are aligned with Chinese interests, indicating a strategic focus on these industries. The attacks suggest a concerted effort to gather intelligence or disrupt operations within these sectors. As these attacks are ongoing, they pose a significant risk to the affected organizations, potentially leading to data breaches or operational disruptions. The implications of these cyber campaigns highlight the need for enhanced security measures in vulnerable industries.

Impact: Gambling and government sectors in Asia
Remediation: Organizations in affected sectors should enhance their cybersecurity measures, including monitoring network activity and implementing robust access controls.
Read Original

Modern ransomware has evolved beyond just encrypting files; it now focuses on psychological tactics to extort money from victims. Ransomware groups are increasingly using the threat of exposing sensitive data to pressure organizations into paying up. This approach not only exploits the fear of data leaks but also the potential liability that could arise from such exposures. As a result, companies and individuals are facing new challenges in dealing with these sophisticated attacks. Understanding these tactics is crucial for organizations looking to bolster their defenses against this growing form of cyber extortion.

Impact: N/A
Remediation: Companies should implement strong data protection measures, conduct regular security training for employees, and develop incident response plans to address potential ransomware attacks.
Read Original

In 2025, numerous internet outages frustrated users across various platforms, with Cloudflare attributing these disruptions to a series of significant events affecting global networks. The incidents were primarily linked to a combination of increased internet traffic and technical difficulties that arose during peak usage times. As a result, many popular websites and services experienced downtime, impacting businesses and consumers alike. This situation serves as a reminder of the vulnerabilities in our interconnected online systems and the need for robust infrastructure to support growing demands. Users and companies alike should be aware of these potential disruptions and consider strategies to mitigate their impact.

Impact: N/A
Remediation: N/A
Read Original
US Charges 31 Suspects in Nationwide ATM Jackpotting Scam

Hackread – Cybersecurity News, Data Breaches, AI, and More

Actively Exploited

U.S. prosecutors have charged 31 additional suspects in a nationwide ATM jackpotting scheme, increasing the total number of defendants to 87 across several states. This scam involves criminals exploiting vulnerabilities in ATMs to dispense large amounts of cash illicitly. The coordinated effort highlights the growing problem of ATM-related fraud, which poses risks to financial institutions and customers alike. Law enforcement agencies are working to dismantle these operations, as they not only lead to significant financial losses but also undermine trust in automated banking systems. The case serves as a reminder of the ongoing challenges in cybersecurity, particularly concerning physical banking infrastructure.

Impact: ATMs, financial institutions
Remediation: Increased security measures for ATMs, including software updates and enhanced physical security protocols.
Read Original

SoundCloud has experienced a significant data breach, affecting nearly 30 million user accounts. Hackers accessed personal and contact information, raising concerns about user privacy and security. This breach underscores the vulnerability of online platforms to cyberattacks, highlighting the need for stronger security measures. Users whose accounts were compromised should be vigilant about potential phishing scams and consider changing their passwords. SoundCloud has not yet detailed how the breach occurred, leaving many questions about the effectiveness of their security protocols.

Impact: SoundCloud user accounts
Remediation: Users should change their passwords and monitor for suspicious activity.
Read Original
Poland Thwarts Russian Wiper Malware Attack on Power Plants

Hackread – Cybersecurity News, Data Breaches, AI, and More

Poland successfully thwarted a cyberattack involving Russian wiper malware aimed at its power and heating plants. This incident, which could have led to significant outages during the winter months, was detected and blocked by Polish officials before any damage occurred. The government has responded by tightening cybersecurity regulations to bolster defenses against potential future attacks. This incident underscores the ongoing tensions between Poland and Russia, particularly regarding cybersecurity threats to critical infrastructure. The prevention of this attack is crucial for maintaining energy stability during colder months, which could have severe implications for public safety and the economy.

Impact: Power and heating plants in Poland
Remediation: Tighter cybersecurity regulations implemented by Polish authorities
Read Original

Recent reports have identified vulnerabilities in Linux systems that could allow attackers to gain root access or bypass authentication through Telnet. This means that unauthorized users could potentially take control of affected systems, posing significant risks to organizations relying on these platforms. The flaws are particularly concerning as they can lead to severe security breaches if not addressed promptly. Organizations using vulnerable Linux distributions should prioritize assessing their systems for these weaknesses and take immediate action to secure their environments. The urgency of this situation highlights the ongoing challenges in maintaining secure infrastructures in the face of evolving cyber threats.

Impact: Linux systems with Telnet enabled
Remediation: Organizations should disable Telnet and apply any available security patches for affected Linux distributions.
Read Original

FortiGuard Labs has reported a multi-stage phishing campaign aimed at users in Russia, utilizing fake business documents as bait. This attack serves to distract victims while the Amnesia RAT malware operates in the background, potentially leading to ransomware deployment. The campaign is particularly concerning as it targets individuals and organizations that may not be aware of the risks associated with unsolicited documents. As attackers continue to refine their tactics, users need to remain vigilant and cautious about opening attachments from unknown sources. The implications of such attacks can be significant, leading to data breaches and financial losses for those affected.

Impact: Users in Russia, specifically those targeted by phishing emails containing fake business documents.
Remediation: Users should avoid opening unsolicited attachments and verify the sender's authenticity. Employing updated antivirus solutions and regular software patches can also help mitigate risks.
Read Original
Actively Exploited

Nike is currently looking into a significant data breach after the World Leaks ransomware group claimed to have released a massive 1.4TB data dump containing sensitive information. The hackers posted the stolen data online, raising concerns about the potential exposure of personal information and other confidential materials related to the company and its customers. This incident underscores ongoing challenges for large corporations regarding data security and the increasing boldness of ransomware groups. As the investigation unfolds, Nike aims to assess the extent of the breach and determine the necessary steps to protect affected individuals and mitigate any further risks. The situation serves as a reminder for companies to strengthen their cybersecurity measures to guard against such attacks.

Impact: Nike data, customer information, internal documents
Remediation: N/A
Read Original

Cybersecurity researchers have identified a JavaScript-based command-and-control framework named PeckBirdy, which has been utilized by China-aligned hackers since 2023. This framework has primarily targeted the Chinese gambling industry, as well as various Asian government entities and private organizations. Trend Micro reports that the flexibility of PeckBirdy allows these attackers to adapt their methods for different environments. The use of such sophisticated tools raises concerns about the security of critical sectors, especially in regions where these attacks are focused. It's crucial for organizations in the affected areas to enhance their security measures to defend against these ongoing threats.

Impact: Chinese gambling industry, Asian government entities, private organizations
Remediation: Organizations should enhance security measures and monitor for unusual activity related to PeckBirdy. Regular updates and employee training on phishing and other attack vectors are recommended.
Read Original

Microsoft has released a patch for a zero-day vulnerability in its Office software, identified as CVE-2026-21509. This flaw allows attackers to bypass certain security features, potentially putting users at risk. Reports suggest that the vulnerability may have already been exploited in targeted attacks against specific organizations. As a result, it's crucial for all users of Microsoft Office to apply this patch promptly to protect themselves from potential intrusions. The patch is part of Microsoft's ongoing efforts to enhance the security of its products and safeguard user data from malicious activities.

Impact: Microsoft Office products, including various versions of Office applications.
Remediation: Users should immediately apply the latest security updates provided by Microsoft to address CVE-2026-21509. Specific patch numbers or versions were not mentioned, but users can check for updates through the Microsoft Update service or the official Microsoft website.
Read Original
PreviousPage 14 of 87Next